Using IP heuristics to protect access tokens from theft and replay
a technology of access tokens and heuristics, applied in the field of using ip heuristics to protect access tokens from theft and replay, can solve problems such as access tokens being stolen
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017]An embodiment disclosed herein is related to computing systems and method for a computing system to generate an access token that includes an IP address from a request. In the embodiment, a request is received for access to one secured data items. The request may include user credentials that specify that a user making the request is permitted to access the secured data items. The user credentials are validated and an Internet Protocol (IP) address that the request was sent from is determined. An access token is generated that includes the IP address that the request was sent from.
[0018]An alternative embodiment herein is related to computing systems and method for a computing system to compare an IP address included in an access token to the IP address that the access token was sent from. An access token is received that includes a first Internet Protocol (IP) address. The access token causes the computing system to provide access to secured data items that are stored at the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


